Hmm, so to understand properly this would require a malicious DNS server
that the CNAME has been delegated to, actively trying to cause a hash
collision?

That's fair. Although I do think this problem can be mitigated by using CAA
with account binding? https://www.rfc-editor.org/rfc/rfc8657

I would prefer to not rely on the collision resistance of this label, since
there are other methods that provide a stronger security controls here?

On Sat, Mar 16, 2024 at 5:22 PM Seo Suchan <tjtn...@gmail.com> wrote:

> reading it again I'm no longer sure we can say account label isn't
> security perpose: entire point of this challange is those
> account-specific hostname CNAMEed to some delegated dns server for acme
> perpose (like https://github.com/joohoi/acme-dns). and when clients are
> using 3rd part DNS hosting service for that most trivial attack method
> from delegated DNS server for such dns server would be trying to create
> an account that using same validation domain. While I'm think while
> current way is safe enough as it needs createing more than 2^40 accounts
> to expecting some collison, I don't think we can say it's non-security
> and should mention this lable need some collision resistence.
>
> _______________________________________________
> Acme mailing list
> Acme@ietf.org
> https://www.ietf.org/mailman/listinfo/acme
>
_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to